# $Id: iTrust-survey.n3,v 1.1 2004/10/19 14:42:05 graham Exp $
#
# iTrust conference paper survey
@prefix rdf: .
@prefix rdfs: .
@prefix dc: .
@prefix foaf: .
@prefix ps: .
@prefix : .
@prefix surv: .
#########################
# 2003 conference
#########################
:lncs2692_1_16
dc:creator
[ foaf:name "Michael Kinateder"
; foaf:mbox "michael.kinateder@informatik.uni-stuttgart.de"
; foaf:organization "University of Stuttgart"
] ;
dc:creator
[ foaf:name "Kurt Rothermel"
; foaf:mbox "kurt.rothermel@informatik.uni-stuttgart.de"
; foaf:organization "University of Stuttgart"
] ;
dc:title "Architecture and Algorithms for a Distributed Reputation System" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:trust "A subjective expectation an agent has about another's future behaviour based on the history of their encounters" ;
ps:description
"""
Proposes a model and algorithm for a distributed reputation system based
on a formalized model of trust.
The system model consists of a number of agents that act as proxies for users
of the reputation system. These agents may form network neighborhoods that
pool information about a given trust category. The trust categories themselves
may be relates by a graph which allows for one category of trust having
impact on another.
Each agent's trust in another agent is modelled as a scalar trust value (0..1),
with no experience being treated as no trust,
and a confidence vector containing information about the experiences on which
the trust is based, and a blacklist flag that is set to indicate that
recommendations from the corresponding agent are to be disregarded.
Each agent tracks its own list of recommendations, and also those
recommendations received from other agents, providing a basis for
evaluating (hypertext-like) a 'hub' and 'authority' rating for each agent.
A recommendation consists of:
the identity of that being rated (including its category),
a rating value (which is an arbitrary simple or complex value),
the identity of the recommender, and
a rating confidence value.
""" .
:lncs2692_17_32
dc:creator
[ foaf:name "Naftaly H. Minsky"
; foaf:mbox "minsky@cs.rutgers.edu"
; foaf:organization "Rutgers University"
] ;
dc:title "Regularity-Based Trust in Cyberspace" ;
ps:category "philosophy" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
This paper starts with a philispohical discussion of trust, identifying
two kinds of trust: familiarity-based and regularily-based.
It then proceeds to describe "law governed interactions" (LGI), and
an architecture for a distributed trusted third party arrangement that
can be used to ensure that the rules of LGI are followed by their
participants. A hypothetical case study of e-cash payments for
services is used to illustrate these ideas.
Finally, an claim is made that the architecture described allows
interactions facilitated by regularity-based trust to be actioned,
but depending on a seed element of familiarity-based trust.
""" .
:lncs2692_33_45
dc:creator
[ foaf:name "Yao-Hua Tan"
; foaf:mbox "ytan@feweb.vu.nl"
; foaf:organization "Free University Amsterdam"
] ;
dc:title "A Trust Matrix Model for Electronic Commerce" ;
ps:category "economics" ;
ps:trust "(None given, but implicitly related to willingness to make a decision that carries risk dependent on the trusted party's behaviour)" ;
ps:description
"""
This paper examines the trust concerns facing business concerns
having no previous interaction with regard to entering into
a e-commerce transaction.
The trust concerns are analysed into a matrix,
one of whose axes concerns kinds of reason that
may cause a party to be trusting
(Social signs, experience, understanding, community),
and the other concerning levels of business activity within
which trust must be established
(communication, tranasation and regulation, relationship).
In each case, trust is further analysed as party trust (the
extent to which a proposed trade partner is trusted) and
control trust (the extent to which a satisfactory outcome can
be ensured in spite of how the trade partner may behave).
Two cases are analyzed according to this matrix, showing very
different criteria that may be used in pracice to establish
first-trade trust.
""" .
:lncs2692_46_58
dc:creator
[ foaf:name "Adrian Baldwin"
; foaf:mbox "Adrian.Baldwin@hp.com"
; foaf:organization "Hewlett Packard Labs"
] ;
dc:creator
[ foaf:name "Simon Shiu"
; foaf:mbox "Simon.Shiu@hp.com"
; foaf:organization "Hewlett Packard Labs"
] ;
dc:title "Hardware Security Appliances for Trust" ;
ps:category "computation" ;
ps:trust "Subjective belief about a system or entity in a particular context" ;
ps:description
"""
This paper analyses the trust relationships in an e-commerce
outsourcing scenario, exposing a number of implicit as well as explicit
elements of trust.
It then goes on to discuss how hardware security modules can be deployed
to provide a finer granularity of control over the exercise of trust required
to achieve some goal. The aggregate trust to be exercised is not changed,
but the hardware modules allow the trust to be vested across a greater
number of trustees (who are assumed not to cullude), thus reducing the
exposure to default by any one party.
This paper discusses trust issues very much at the level of system requirements,
rather than dealing with specific architectural or algorithmic issues.
""" .
:lncs2692_59_74
dc:creator
[ foaf:name "Boris Dragovic"
; foaf:mbox "Boris.Dragovic@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Steven Hand"
; foaf:mbox "Steven.Hand@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Tim Harris"
; foaf:mbox "Tim.Harris@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Evangelos Kotsovinos"
; foaf:mbox "Evangelos.Kotsovinos@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Andrew Twigg"
; foaf:mbox "Andrew.Twigg@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:title "Managing Trust and Reputation in the XenoServer open platform" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:trust "(No complete definition; emphasis on subjectivity and context dependence; impilcitly related to decision making inthe face of risk)" ;
ps:seeAlso "SECURE project" ;
ps:description
"""
This paper describes the architecture of the XenoServer/XenoTrust platform,
and says relatively little about the specific nature or modelling of trust.
Key trust management ideas are:
(a) some form of "authoritative" trust, especially with respect to identify,
is needed to "bootstrap" the system, and
(b) participants may all have different views about what is important, and
differing requirements about how to evaluate trust from advertised statements.
There is a clear distinction between "authoritative" vs "reputation-based"
trust: the former is Boolean, and presumed to be absoluytely determined by some
out-of-band mechanism; the latter is a continuous value based on published
statements by participants in the overall system.
No single standard of behaviour or trust assignment model:
separates trust management system architecture from details of trust.
Proposes the use of a functional language for participants to describe
rules for evaluating trust from published statements.
""" .
:lncs2692_75_90
dc:creator
[ foaf:name "Peter Herrmann"
; foaf:mbox "Peter.Herrmann@udo.edu"
; foaf:organization "University of Dortmund"
] ;
dc:title "Trust-Based Protection of Software Component Users and Designers" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:trust "The user's [of a software component] belief or disbelief in the [security of] the particular component [and] their uncertainty about it" ;
ps:description
"""
This paper focuses on the relatively limited application of trust in the context
of security of software built from independently developed components. (Although
limited, this may have great importance to areas such as web service
composition.) It describes the architecture and algorithms of of a component
software trust information service that may be used to aid the selection of
reliable compoents. Specifcally, it addresses the use of reputation and trust
analysis to avoid possible problems with incorrect reports of security errors in
a component.
The paper presumes the use of a "security wrapper" to monitor execution of a
software component with respect to its contractural obligations (and also
execution of an application that uses that component). A form of Josang's
subjective logic metric is used to assess the component's reliability, and
components which over time are shown to be reliable may be excused the overhead
of security wrapper monitoring for every use.
Reports of correctness of problems with a component are compared with the
security wrapper reports and used to deruve a "recommendation trust" value for
the reporter.
""" .
:lncs2692_91_107
dc:creator
[ foaf:name "Tyrone Grandison"
; foaf:mbox "tgrand@doc.ic.ac.uk"
; foaf:organization "Imperial College London"
] ;
dc:creator
[ foaf:name "Morris Sloman"
; foaf:mbox "m.sloman@doc.ic.ac.uk"
; foaf:organization "Imperial College London"
] ;
dc:title "Trust Management Tools for Internet Applications" ;
ps:category "computation" ;
ps:trust "The quantified belief by a trustor with respect to the competence, honesty, security and dependability of a trustee within a specific context" ;
ps:trust "Trust management: the activity of collecting, codifying, analysing, and presenting evidence relating to competence, honesty, security or dependability with the purpose of making assessments and decisions regarding trust relationships for Internet applications" ;
ps:description
"""
This paper describes the SULTAN trust management toolkit for specifying,
analysing and monitoring trust specifications.
SULTAN has four main components:
a specification editor, based on a Prolog-like language for specifying
trust and recommendation. The definition of trust is closely reflected in
trust expressions,
a trust analysis tool, which allows various Prolog-like queries to be
evaluated against a stored trust specification,
a risk service, used to retrieve and analyze risk information, and
a monitoring service.
""" .
:lncs2692_108-122
dc:creator
[ foaf:name "David Ingram"
; foaf:mbox "dmi1000@cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:title "Trust-Based Filtering for Augmented Reality" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:seeAlso "SECURE project" ;
ps:trust "A quantified predictor of [a] principal's behaviour based on evidence of previous interactions" ;
ps:description
"""
This paper describes the design and algorithms for a system to filter
comments about some subject based on trust of those principals making
the comments. Although the application is quite specific, the paper
identifies recommendation system concerns in a way that could apply in
a variety of applications. The application concerned if particularly
focused on distribution, scalability and comments that are not directed
toward a known receiving principal, and identifies a number of
simplifiying assumptions used in its particular scenario.
Section 3 has a useful, crisp summary of a range of issues to be
considered by recommendation-based trust systems.
""" ;
rdfs:comment
"""
David did work on distributed hash tables for SECURE.
May bear re-reading this. Should make notes about detection of
outliers here. Statistics in large networks.
""" .
:lncs2692_123-135
dc:creator
[ foaf:name "Piotr Cofta"
; foaf:mbox "Piotr.Cofta@nokia.com"
; foaf:organization "Nokia Group"
] ;
dc:creator
[ foaf:name "Stephen Crane"
; foaf:mbox "Stephen.Crane@hp.com"
; foaf:organization "Hewlett Packard Labs"
] ;
dc:title "Towards the Intimate Trust Advisor" ;
ps:category "computation" ;
ps:trust "Relational Trust: one's expectation that the outcome of the other's unobservable or incomprehensible behaviour is favourable" ;
ps:trust "Computational Trust: one's supported expectation that can be expressed as a computationally effective function that the outcome of the other's unsupervised behaviour is favourable according to one's understanding" ;
ps:description
"""
This paper describes the design for a system that will be used to explore
whether inter-personal (subjective) trust can be replaced by computed trust,
with particular reference to the environment of mobile and supporting
information processing resources. The specific focus of this experiment
is the implementation of a personal (intimate) trust advisor that can be
queried from and concerning a variety of scenarios.
A number of use-cases are considered with respect to a specified
reference architecture, combining hand-held facilities, personal
computing facilities and a fixed supporting infrastructure.
""" .
:lncs2692_136-149
dc:creator
[ foaf:name "Colin English"
; foaf:mbox "Colin.English@cis.strath.ac.uk"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Waleed Wagealla"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Paddy Nixon"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Sotirios Terzis"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Helen Lowe"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Andrew McGettrick"
; foaf:organization "University of Strathclyde"
] ;
dc:title "Trusting Collaboration in Global Computing Systems" ;
ps:category "computation" ;
ps:seeAlso "SECURE project" ;
ps:trust "The mechanism [used] to cope with the inherrent risks when dealing with only partial information about people and the environment" ;
ps:description
"""
This paper describes a trust management system architecture for a mobile
computing environment in which parties do not have complete information
about each other or the environment within which transactions are conducted.
The design is built around a trust/collaboration life cycle,
including the following phases:
(a) collaboration request analyser,
(b) entity recognition mechanism,
(c) trust formation
(d) trust exploitation (risk assessment using trust information),
(e) collaboration monitoring, and
(f) collaboration evaluation (updating stored trust values; also trust evolution).
The trust exploitation, trust formation, trust update and trust evolution
functions are handled within a "trust box" component.
""" .
:lncs2692_150_164
dc:creator
[ foaf:name "Daniela Memmo"
; foaf:mbox "dmemmo@alma.unibo.it"
; foaf:organization "University of Bologna"
] ;
dc:creator
[ foaf:name "Giovanni Sartor"
; foaf:mbox "sartor@cerfid.unibo.it"
; foaf:organization "University of Bologna"
] ;
dc:creator
[ foaf:name "Gioacchino Quadri di Cardano"
; foaf:mbox "gquadri@cerfid.unibo.it"
; foaf:organization "University of Bologna"
] ;
dc:title "Trust, Reliance, Good Faith, and the Law" ;
ps:category "legal" ;
ps:trust """Trust consisting of Core Trust and Reliance:
Core trust: the truster (1) has a certain goal, (2) believes the trustee can bring about that goal (competence), (3) believes the trustee is willing to bring about that goal (disposition);
Reliance: the truster (4) believes he needs to rely on the trustee to bring about the goal (dependence), (5) believes the trustee's action will achieve the goal [competence]
""" ;
ps:description
"""
This paper explores interactions between law and (subjective) trust, with
emphasis on the idea that these are complementary, not alternatative,
mechanisms for achieving desirable outcomes in a transaction.
Law serves to increase a trustee's disposition to trusting behaviour,
and to reduce the risk to the truster from default,
but does not completely displace these matters: law is only one component
in establishing the disposition belief element of trust.
Conversely, laws may come about with the purpose of protecting the
expectations derived from trust.
The paper also explores situations in which the expected outcome of
reasonable trust may be protected by law, even when there is no purely
legal basis (e.g. contract) to enforce that outcome. [This aspect of
the paper is quite heavily based in Italian law.]
""" .
:lncs2692_165_178
dc:creator
[ foaf:name "Michael Grimsley"
; foaf:mbox "m.f.grimsley@shu.ac.uk"
; foaf:organization "Sheffield Hallam University"
] ;
dc:creator
[ foaf:name "Anthony Meeham"
; foaf:mbox "a.s.meehan@open.ac.uk"
; foaf:organization "The Open University"
] ;
dc:creator
[ foaf:name "Geoff Green"
; foaf:mbox "g.green@shu.ac.uk"
; foaf:organization "Sheffield Hallam University"
] ;
dc:creator
[ foaf:name "Bernard Stafford"
; foaf:mbox "b.stafford@york.ac.uk"
; foaf:organization "University of York"
] ;
dc:title "Social capital, Community Trust and E-government Services" ;
ps:category "sociology" ;
ps:category "statistics" ;
ps:trust "(None given; but in part the paper explores the notion of trust as social capital)" ;
ps:description
"""
This paper describes a large-scale community survey that explores the
relationship between trust within the community and perceptions of the
quality of government services.
The experiment was design to test the ideas that there are distinct
identifiable forms of trust that may be observed within a community and
its institutions (Horizontal, between community members and Vertical between
community members and the institutions that serve them. The latter may be
subdivided into Input and Output trust). Evidence was found supporting the
existence of all these forms of trust.
The results of the survey lead to a proposed Trust Cycle describing the
propagation of trust within a community.
The results of the survey also show a clear link between community trust
levels and information provision by institutions. Some implications for
e-government information systems are explored.
""" .
:lncs2692_179_194
dc:creator
[ foaf:name "Audun Josang"
; foaf:mbox "ajosang@dstc.edu.au"
; foaf:organization "Distributed Systems Technology Centre"
] ;
dc:creator
[ foaf:name "Shane Hird"
; foaf:mbox "shird@dstc.edu.au"
; foaf:organization "Distributed Systems Technology Centre"
] ;
dc:creator
[ foaf:name "Eric Faccer"
; foaf:mbox "efaccer@dstc.edu.au"
; foaf:organization "Distributed Systems Technology Centre"
] ;
dc:title "Simulating the Effect of Reputation Systems on E-markets" ;
ps:category "economics" ;
ps:category "statistics" ;
ps:category "reputation" ;
ps:trust "(None given)" ;
ps:description
"""
This paper describes a simulation of the effect of a reputation system
on honesty in an e-market. The reputation system used calculates a
reputation based on observed behaviour and a probability estimate based
on the beta-distribution.
The simulation indicates that the reputation system does indeed have an
affect on the market and an improvement in market honesty is seen
where both seller and buyer behaviour evolves following
some simple rules. It is noted that keeping reputation information
indefinitely is not helpful, and better overall market honesty is
achieved if older reputation data gives way to more recent data.
This describes an arbitrary simulation, and no attempt is made to
formally verify the particular models used, particularly with respect
to evolution of seller and buyer behaviour.
""" .
:lncs2692_195_210
dc:creator
[ foaf:name "Christiano Castelfranchi"
; foaf:mbox "castel@ip.rm.cnr.it"
; foaf:organization "Institute of Cognitive Sciences and Technologies - CNR"
] ;
dc:creator
[ foaf:name "Rino Falcone"
; foaf:mbox "falcone@ip.rm.cnr.it"
; foaf:organization "Institute of Cognitive Sciences and Technologies - CNR"
] ;
dc:creator
[ foaf:name "Giovanni Pezzulo"
; foaf:mbox "pezzulo@ip.rm.cnr.it"
; foaf:organization "Institute of Cognitive Sciences and Technologies - CNR"
] ;
dc:title "Integrating Trustfulness and Decision Using Fuzzy Cognitive Maps" ;
ps:category "psychology" ;
ps:trust "(None given)" ;
ps:description
"""
This paper uses a technique called "Fuzzy Cognitive Maps" to construct
a pseudo-quantitative model of trust, taking into account a number of
cognitive factors such as the subject's belief in the trusted agent's
ability, availability, potential for harm, and external factors such
as opportunity for good, potential danger from non-perormance.
(I say pseudo-quantitative, because it's not clear to me what is
actually being measured.)
The technique described is used to evaluate some hypothetical
scenarios related to healthcare assessment and treatment provided by
a human doctor and an automated treatment machine.
The contribution of this paper seems to be an illustration of how
diverse cognitive assessments may combine to create a complex composite
assessment of trust in an agent for some given situation, affected by
general and specific knowledge of the tusted agent, beliefs about the
agent and possible outcomes, emotional disposition, and other factors.
""" .
:lncs2692_211_224
dc:creator
[ foaf:name "Zheng Yang"
; foaf:mbox "zheng.z.yang@nokia.com"
; foaf:organization "Nokia Group"
] ;
dc:creator
[ foaf:name "Piotr Cofta"
; foaf:mbox "piotr.cofta@nokia.com"
; foaf:organization "Nokia Group"
] ;
dc:title "Methodology to Bridge Different Domains of Trust in Mobile Communications" ;
ps:category "computation" ;
ps:trust "The confidence of an entity on another entity based on the expectation that the other entity will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other entity" ;
ps:description
"""
This paper describes a methodology for building trust across
a distributed system by analysing the system into trust domains,
and coopting or creating components or new domains to act as trust
bridges between the domains.
The methodology is illustrated by use-cases related to mobile communications.
""" .
:lncs2692_225_238
dc:creator
[ foaf:name "Andrew Twigg"
; foaf:mbox "andrew.twigg@cl.cam.ac.uk"
; foaf:organization "Cambridge University Computer Laboratory"
] ;
dc:title "A Subjective Approach to Routing in P2P and Ad Hoc Networks" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:category "statistics" ;
ps:seeAlso "SECURE project" ;
ps:trust "Trust values: elements of a complete lattice (T,<=)" ;
ps:description
"""
Describes a routing algorithm for use in peer-to-peer and adhoc networks
that uses estimates of component reliability (trust) in selecting a
route. These estimates are built up from observations of success and
failure to transfer packets over specified routes.
The routing algorithm is asserted to function successfully in the face
of malicious and colluding network components.
The trust values are based on Josang's subjective logic, with an ordering
function based on a corresponding expected probability of success.
The paper also explores use of the statistical model constructed to
minimize risk (e.g. expected transmission energy costs in a wireless
network).
An interesting feature of this paper is that it describes a complete,
self-contained application that makes use of models and computations
of trust.
""" .
:lncs2692_239_254
dc:creator
[ foaf:name "Elizabeth Gray"
; foaf:mbox "grayl@tcd.ie"
; foaf:organization "Trinity College Dublin"
] ;
dc:creator
[ foaf:name "Jean-Marc Seigneur"
; foaf:mbox "Jean-Marc.Seigneur@trustcomp.org"
; foaf:organization "Trinity College Dublin"
] ;
dc:creator
[ foaf:name "Yong Chen"
; foaf:mbox "cheny@tcd.ie"
; foaf:organization "Trinity College Dublin"
] ;
dc:creator
[ foaf:name "Christian Jensen"
; foaf:mbox "cdj@imm.dtu.dk"
; foaf:organization "Technical University of Denmark"
] ;
dc:title "Trust Propagation in Small Worlds" ;
ps:category "computation" ;
ps:category "sociology" ;
ps:seeAlso "SECURE project" ;
ps:trust "(No definition given; implicitly used as modifier of risk)" ;
ps:description
"""
This paper surveys the sociology research into the "small world" concept,
emanating from seminal work by Stanley Milgram. It then goes on to describe
the use of results from this work in the design of a system that presumes
small-world effects to facilitate the propagation of trust within a larger
community, thus supporting the ad-hoc formation of small groups within which
members are susceptible to behaviour of other group members.
The ideas are illustrated by an example of ad hoc formation of a blackjack
game with members who may or may not have direct acquaintance, but whose
good behaviour may be indicated by recommendations from other parties
outside the immediate group.
This leads to a justification for the SECURE trust-based security
architecture, whose key elements are entity recognition, trust management,
risk assessment and admission control.
""" .
:lncs2692_255_270
dc:creator
[ foaf:name "Tim Moreton"
; foaf:mbox "Tim.Moreton@cl.cam.ac.uk"
; foaf:organization "Cambridge University Computer Laboratory"
] ;
dc:creator
[ foaf:name "Andrew Twigg"
; foaf:mbox "Andrew.Twigg@cl.cam.ac.uk"
; foaf:organization "Cambridge University Computer Laboratory"
] ;
dc:title "Enforcing Collaboration in Peer-to-Peer Routing Services" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:category "economics" ;
ps:category "statistics" ;
ps:seeAlso "SECURE project" ;
ps:trust "Trust values: elements of a complete lattice (T,<=)" ;
ps:description
"""
Describes an algorithm for distributed route discovery in peer-to-peer
networks, with built-in mechanisms to avoid "free-riding" or "subversion"
of the routing service by non-coperative nodes.
The algorithm takes into account a computed value of trust for each node,
with respect to how well it participates in packet forwarding, and also
concerning the quality of recommendations it provides about network routing
properties.
The result is that each node has a strong incentive to provide accurate
routing information if it wishes to take advantage of the distributed
routing infrastructure.
""" .
:lncs2692_271_274
dc:creator
[ foaf:name "Robert Kalcklosch"
; foaf:mbox "rkalckloesch@ivs.tu-berlin.de"
; foaf:organization "Berlin University of Technology"
] ;
dc:creator
[ foaf:name "Klaus Herrmann"
; foaf:mbox "kh@ivs.tu-berlin.de"
; foaf:organization "Berlin University of Technology"
] ;
dc:title "Statistical Trustability (Conceptual Work)" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:trust "A relation between entities that ties them together to form a complex network" ;
ps:description
"""
This short paper discusses the concept of using a statistically based trust
measure calculated from observed behaviour, and communicated between
participants in the network. The paper raises a number of issues that such
a system must address, without offering any specific solutions.
""" .
:lncs2692_275_283
dc:creator
[ foaf:name "Marianne Winslette"
; foaf:mbox "winslett@uiuc.edu"
; foaf:organization "University of Illinois"
] ;
dc:title "An Introduction to Trust Negotiation" ;
ps:category "computation" ;
ps:category "privacy" ;
ps:trust "(None given)" ;
ps:description
"""
This paper explores the translation of real-world transaction systems
(e.g. credit card purchase) into the digital domain. It explores the
exchanges of information that may be needed, taking account of privacy
and disclosure concerns, in order to complete a transaction.
Another example considered is access to medical records.
This work is aiming towards a policy description language for
conducting negotiations in which trust must be established in order
to complete a transaction.
""" .
:lncs2692_284_300
dc:creator
[ foaf:name "Matt Blaze"
; foaf:mbox "mab@research.att.com"
; foaf:organization "AT&T Labs"
] ;
dc:creator
[ foaf:name "John Ioannidis"
; foaf:mbox "ji@research.att.com"
; foaf:organization "AT&T Labs"
] ;
dc:creator
[ foaf:name "Angelos D. Keromytis"
; foaf:mbox "angelos@cs.columbia.edu"
; foaf:organization "Columbia University"
] ;
dc:title "Experience with the Keynote Trust Management System: Applications and Future Directions" ;
ps:category "computation" ;
ps:trust "(None given, but in this context 'Trust' might be read as 'Authorization'. There is no subjective component.)" ;
ps:description
"""
This paper reviews seminal work on the trust management systems, PolicyMaker
and KeyNote. These are called "Trust Management" systems, but it might be
more accurate to call them "Authorization Decision" systems. The fundamental
departure in these systems from earlier work is that authorization is evaluated
directly from given credentials with respect to a specified policy, where
earlier systems would first authentciate a request, then test to see if the
identified requester was authorized to perform some action.
These systems unify the concepts of security policy, credentials, access control
and authorization.
Also implicit in the design of these systems is that the authorization decision
component is independent of any particular application.
The paper goes on to outline a number of areas in which KeyNote has been
applied (which are very wide-ranging), and finally discusses some areas where
the KeyNote policy description language has been found lacking.
""" .
:lncs2692_301_317
dc:creator
[ foaf:name "Walt Teh-Ming Yao"
; foaf:mbox "wtmy2@cl.cam.ac.uk"
; foaf:organization "Cambridge University Computer Laboratory"
] ;
dc:title "Fidelis: A Policy-Driven Trust Management Framework" ;
ps:category "computation" ;
ps:trust "A set of assertions that a principal holds with regard to another principal" ;
ps:description
"""
Fidelis is another authorization decision system, along the lines of
PolicyMaker/KeyNote.
The key difference between Fidelis and the other
"trust management" systems is the Fidelis restricts itself to "simple
credentials", where other systems use "rich credentials", the latter
being potentially powerful predicates similar to those that appear within
policy statements. A claimed advantage of "simple credentials" is a cleaner
separation within the system between credentials and policies, allowing
policies to be strictly local to each participating node
""" .
:lncs2692_318_331
dc:creator
[ foaf:name "Yucel Karabulut"
; foaf:mbox "yuecel.karabulut@udo.edu"
; foaf:organization "University of Dortmund"
] ;
dc:title "Implementation of an Agent-Oriented Trust Management Infrastructure Based on a Hybrid PKI Model" ;
ps:category "computation" ;
ps:trust "(None given, but in this context 'Trust' might be read as 'Authorization'. There is no subjective component.)" ;
ps:description
"""
This paper describes an approach to security and authorization using a
fusion of traditional X.509 identity-based certificates and SPKI-style
direct authority assertions. Much of the paper is a fairly detailed
description of a software system that implements this approach.
""" .
:lncs2692_332_347
dc:creator
[ foaf:name "Michael T. Goodrich"
; foaf:mbox "goodrich@acm.org"
; foaf:organization "University of California, Irvine"
] ;
dc:creator
[ foaf:name "Michael Shin"
; foaf:mbox "mys@cs.jhu.edu"
; foaf:organization "John Hopkins University"
; foaf:mbox "mys@cs.brown.edu"
; foaf:organization "Brown University"
] ;
dc:creator
[ foaf:name "Roberto Tamassia"
; foaf:mbox "rt@cs.brown.edu"
; foaf:organization "Brown University"
] ;
dc:creator
[ foaf:name "William H. Winsborough"
; foaf:mbox "william_winsborough@nai.com"
; foaf:organization "Network Associates Laboratories"
] ;
dc:title "Authenticated Dictionaries for Fresh Attribute Credentials" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
This paper is an attack on the certificate revocation problem, and similar
situations in which signed information must be propagated in timely fashion
via a third party. It has little to do with trust, beyond not requiring
that the party distributing the information need not be completely trusted:
any failure on their part to distribute updates in timely fashion can
can be detected by the original suppliers of certified information.
The technique described builds upon existing work on authenticated
dictionaries, augmented by having a mutually-signed "basis" value distributed
with the result of any query for data from the dictionary.
""" .
#########################
# 2004 conference
#########################
:lncs2995_1_15
dc:creator
[ foaf:name "Ian Walden"
; foaf:mbox "i.n.walden@qmul.ac.uk"
; foaf:organization "Queen Mary, University of London"
] ;
dc:title "Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment" ;
ps:category "legal" ;
ps:trust "(None given)" ;
ps:description
"""
In a democratic society, the interference caused by a criminal investigation
must be justifiable and proportionate to the needs of the society.
The growth of network-based crime has raised difficult issues in prosecuting
such crime, and the rights of data users.
This paper discusses some of the problems raised by data for law enforcement
agencies investigating network-based crime. It examines recent legislative
measures in UK and other jurisdictions to address some of these problems of
criminal procedure and the extent to which such measures achieve an appropriate
balance between inevitably conflicting interests.
The nature of digital information makes it extremely diffiult to ensure that
differing types of information (e.g. signalling and content) continue to be
subject to distinct legal treatment. Our inability to practicably distinguish
potentially erodes the protections granted to individuals by law.
To address this data problem is likely to require a variety of approaches,
both legal and procedural.
""" .
:lncs2995_16_26
dc:creator
[ foaf:name "Andrzej Uszok"
; foaf:mbox "auszok@ihmc.us"
; foaf:organization "Institute for Human and Machine Cognition"
] ;
dc:creator
[ foaf:name "Jeffrey M. Bradshaw"
; foaf:mbox "jbradshaw@ihmc.us"
; foaf:organization "Institute for Human and Machine Cognition"
] ;
dc:creator
[ foaf:name "Renia Jeffers"
; foaf:mbox "rjeffers@ihmc.us"
; foaf:organization "Institute for Human and Machine Cognition"
] ;
dc:title "KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
KAoS is a policy and domain services framework based on
W3C's Web Ontology Language (OWL).
KAos uses OWL to create rich descriptions of policies, domains and other
managed entities, which can be used as a basis for automated reaosning about
those entities. The richness of information can capture essential
ingredients upon which trust may be based.
It is envisaged that ongoing work in the area of Semantic Web Services
will enhance the systm capabilities with respect to trust negotiation
and management.
This paper describes the key architectural components of KAoS, including
ontologies, policy representation, policy management and life-cycle. It
also indicates anumber of applications in which KAoS has been used.
""" .
:lncs2995_27-32
dc:creator
[ foaf:name "Massimo Marchiori"
; foaf:mbox "massimo@w3.org"
; foaf:organization "World Wide Web Consortium (W3C)"
] ;
dc:title "W5: The Five W's of the World Wide Web" ;
ps:category "computation" ;
ps:trust """Trust Scenario: (T,R,U,S,t), where:
T is a trust property,
t is a computable test property,
U is a universe of entities,
R is a probability that t implies T
S is a mapping from U to [0,1] indicating that the subjective
probability for an entity e in U that t implies T is S(e)
""" ;
ps:description
"""
This paper discusses the role of deception in the World Wide Web,
and some of the means by which it can be reduced
(thus enhancing the basis of trust in WWW).
Simplistic, low-cost interpretations of the Web leave users exposed to many
foprms of deception. But by taking account of other factors (a wider
range of W's: What, Where, Who, When, Why), opportunities for deception can
be mitigated, but at some cost.
""" .
:lncs2995_33_47
dc:creator
[ foaf:name "Philipp Obreiter"
; foaf:mbox "obreiter@ipd.uni-karlsruhe.de"
; foaf:organization "Universitat Karlsruhe (TH)"
] ;
dc:title "A Case for Evidence-Aware Distributed Reputation Systems; Overcoming the Limitatioins of Plausibility Consioderations" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:trust "A substitute for complete information regarding the entities that participate in [open artificial] societies" ;
ps:description
"""
This paper examines the role of plausibility in reputation systems, and the
potential for pollution of reputations by untruthful recommendations and
failure to disseminate recommendations. It asserts that current systems rely
on a notion of plausibility in order to assess the likely accuracy of a
recommendation, and describes some scenarios in which this may lead to
an inaccurate assessment of a party's reliability.
It then proposes a system of evidences, based on non-repudiable statements
(cryptographically assured), that can be used to overcome the limitations
of using plausibility. Using such evidence, a party can self-recommend,
detect untruthful recommendations about themselves, and may be able to
refute an incorrect recommendation.
""" .
:lncs2995_48_62
dc:creator
[ foaf:name "Jinshan Liu"
; foaf:mbox "Jinshan.Liu@inria.fr"
; foaf:organization "INRIA - Rocquencourt"
] ;
dc:creator
[ foaf:name "Valerie Issarny"
; foaf:mbox "Valerie.Issarny@inria.fr"
; foaf:organization "INRIA - Rocquencourt"
] ;
dc:title "Enhanced Reputation Mechanism for Mobile Ad Hoc Networks" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:trust "A particular level of the subjective probability with which an agent assesses that another agent or group of agents will perform a particular action, both before he can monotor such action (or independently of his capacity ever to be able to monitor it) and in a context in which it affects his own action" ;
ps:trust "Reputation: a perception regarding [an agent's] behaviour norms, which is held by other agents, based on experiences and observation of its past actions" ;
ps:description
"""
This paper gives a fairly detailed description of the design of a
reputation system for use in mobile ad hoc networks, in which there
is no central trusted component for collecting and distributing
reputation information. The design clearly separated recommendation
performance of an agent from its service performance, and reputation
with respect of these concepts is build up seprately. The design
incorporates features to mitigate free-riding, defamation and collusion
attacks on the system.
The design is supported by experiments that simulate a mix of agents
that are trustworthy or not with regard to service performance and
recommendations given.
""" .
:lncs2995_63_77
dc:creator
[ foaf:name "Alberto Fernandes"
; foaf:mbox "Alberto.Fernandes@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Evangelos Kotsovinos"
; foaf:mbox "Evangelos.Kotsovinos@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Sven Ostring"
; foaf:mbox "Sven.Ostring@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:creator
[ foaf:name "Boris Dragovic"
; foaf:mbox "Boris.Dragovic@cl.cam.ac.uk"
; foaf:organization "University of Cambridge Computer Laboratory"
] ;
dc:title "Pinocchio: Incentives for Honest Participation in Distributed Trust Management" ;
ps:category "computation" ;
ps:category "economics" ;
ps:category "statistics" ;
ps:category "reputation" ;
ps:trust "(None given)" ;
ps:description
"""
Pinocchio is a framework for awarding incentives for honest participation
in a distributed trust management infrastructure. There are a number of
ways in which participants may try to cheat in such systems: Pinocchio
concentrates on one such attack, free-riding, in which participants fail
to provide recommendations, or provide recommendations that are not based
on actual experience (this being assuymed to be cheaper than providing
real; recommendations).
Using a statistical analysis of the recommendations from multiple parties,
the system attempts to distinguish those who are offering real
recommendations from those who are offering random or incorrect
recommendations. Participants who are judged not to offer true
recommendations are penalized by reducing their access to the system.
The theoretical work is supported by some simulations, but further
experimental work is needed to test whether the ideas work out in
practice.
""" .
:lncs2995_78_92
dc:creator
[ foaf:name "Laurent Bussard"
; foaf:mbox "bussard@eurecom"
; foaf:organization "Institut Eurecom"
] ;
dc:creator
[ foaf:name "Refik Molva"
; foaf:mbox "molva@eurecom"
; foaf:organization "Institut Eurecom"
] ;
dc:creator
[ foaf:name "Yves Roudier"
; foaf:mbox "roudier@eurecom"
; foaf:organization "Institut Eurecom"
] ;
dc:title "History-Based Signature or How to Trust Anonymous Documents" ;
ps:category "computation" ;
ps:category "privacy" ;
ps:trust "(None given)" ;
ps:description
"""
This paper describes a cryptographic signature technique for creating
an anonymous, non-transferrable, history-based signature.
Such a signature can be used to prove the signer's context
(e.g. location, time, group membership, recommendations)
without disclosing the signer's identity or pseudonym.
It is claimed that this type of signature can be used to build
a degree of trust in anonymous documents.
The signature combines from a certifying authority (who confirms
the signer's posession of a secret) and a witness (who confirms some
aspect of the signer's context).
The crytopgraphic signature is based on an adaptation of existing
"proof of knowledge" schemes.
""" .
:lncs2995_93_107
dc:creator
[ foaf:name "Jean-Marc Seigneur"
; foaf:mbox "Jean-Mark.Seigneur@cs.tcd.ie"
; foaf:organization "Trinity College Dublin"
] ;
dc:creator
[ foaf:name "Christian Damsgaard Jensen"
; foaf:mbox "Christian.Jensen@imm.dtu.dk"
; foaf:organization "Technical University of Denmark"
] ;
dc:title "Trading Privacy for Trust" ;
ps:category "computation" ;
ps:category "privacy" ;
ps:seeAlso "SECURE project" ;
ps:trust "A complex predictor of [an] entity's future behaviour based on past evidence" ;
ps:description
"""
This paper explores the relation between trust and privacy.
To the extent that trust is based on knowledge, increased trust
comes at the cost of reduced privacy. A principal may be
prepared to sacrifice privacy for trust if sufficient benefit
is achieved as a result of the increased trust.
The proposed framework is based on using pseudonyms, which are
the subjects of evidence from which trust may be assessed. A
single principal may have an arbitrary number of different
pseudonyms. In some cases it may be necessary to link psudonyms
to create an increased level of trust for a transaction. But
such a framework may also suffer from requests for information
that are not needed to establish the needed level of trust and,
once lost, privacy ios very hard or impossible to regain.
This paper discusses a number of issues related to this framework,
and proposes models which can be used to evaluate the trade-off
between trust and privacy.
""" .
:lncs2995_108_119
dc:creator
[ foaf:name "Elan Pavlov"
; foaf:mbox "elan@cs.huji.ac.il"
; foaf:organization "Hebrew University, Jerusalem"
] ;
dc:creator
[ foaf:name "Jeffrey S. RosenSchein"
; foaf:mbox "jeff@cs.huji.ac.il"
; foaf:organization "Hebrew University, Jerusalem"
] ;
dc:creator
[ foaf:name "Zvi Topol"
; foaf:mbox "zvit@cs.huji.ac.il"
; foaf:organization "Hebrew University, Jerusalem"
] ;
dc:title "Supporting Privacy in Decentralized Additive Reputation Systems" ;
ps:category "computation" ;
ps:category "reputation" ;
ps:category "privacy" ;
ps:trust "(None given)" ;
ps:description
"""
This paper explores the problem of protecting the privacy of recommendations
in a distributed reputation system that combines multiple recommendations
using addition. The challenge is to prevent disclosure of any one
recommender's rating while provding the final combined result.
The paper describes three protocols for achieving this with varying
degrees of resistance to collusion between dishonest agents.
The most resistant protocol presented makes use of zero knowledge
proofs.
""" .
:lncs2995_120_134
dc:creator
[ foaf:name "Colin English"
; foaf:mbox "Colin.English@cis.strath.ac.uk"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Sotiris Terzis"
; foaf:mbox "Sotiris.Terzis@cis.strath.ac.uk"
; foaf:organization "University of Strathclyde"
] ;
dc:creator
[ foaf:name "Waleed Wagealla"
; foaf:mbox "Waleed.Wagealla@cis.strath.ac.uk"
; foaf:organization "University of Strathclyde"
] ;
dc:title "Engineering Trust Based Collaborations in a Global Computing Environment" ;
ps:category "computation" ;
ps:seeAlso "SECURE project" ;
ps:trust "Trust is used as a mechanism for managing risk and learning from past interactions in order to reduce risk exposure" ;
ps:description
"""
This paper explores the relationship between risk and trust, and describes
a franework within which they may be combined when making trusting
decisions. This framework is tested in the context of two scenarios
involving distribution of private information and e-cash. The paper is
an attempt to "chart the space" of interaction between trust and risk,
rather than to engineer a particular solution.
Conclusions include: the relationship (mapping) between risk and
trust is a central concern and the system needs to explicitly deal
with uncertainty with respect to the elements of risk.
""" .
:lncs2995_135_145
dc:creator
[ foaf:name "Audun Josang"
; foaf:mbox "ajosang@dstc.edu.au"
; foaf:organization "DSTC, Queensland University of Technology"
] ;
dc:creator
[ foaf:name "Stephane Lo Presti"
; foaf:mbox "splp@ecs.soton.co.uk"
; foaf:organization "University of Southampton"
] ;
dc:title "Analysing the Relationship between Risk and Trust" ;
ps:category "computation" ;
ps:category "economics" ;
ps:trust "The extent to which one party is willing to depend on somebody, or something, in a given situation with a feeling of relative security, even though negative consequences are possible" ;
ps:description
"""
This paper analyses the relationship between risk and trust, combining the
classical statistical notion of expected outcome with a decision maker's attitude
to risk. This approach explains decisions that might be considered irrational
when assessed in terms of expected outcome (e.g. purchase of lottery ticket).
Analysys of factors affecting such decisions leads to the idea of a
"decision surface" which reflects one's propensity to make a decision
in terms of amount of principal to be invested, possible gain and probability
of success. An example decision surface function is offered, which explains
a numbered of decision observed behaviours commonly observed in real life.
""" .
:lncs2995_146_160
dc:creator
[ foaf:name "Gyrd Braendeland"
# foaf:mbox "...@..."
; foaf:organization "University of Oslo"
] ;
dc:creator
[ foaf:name "Ketil Stolen"
# foaf:mbox "...@..."
; foaf:organization "SINTEF ICT, Norway"
] ;
dc:title "Using Risk Analysis to Assess User Trust - A Net Bank Scenario" ;
ps:category "computation" ;
ps:category "sociology" ;
ps:category "psychology" ;
ps:category "economics" ;
ps:trust "The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party" ;
ps:trust "The proposed approach defines user trust as an asset [of the trustee]" ;
ps:description
"""
The paper starts out by exploring some of the psychological and social
contributors to trust. It then reviews the CORAS methodology for risk
analysis, which analyses system vulnerabilities and unwanted incidents
with regard to identified assets [what are these?],
and uses a specialization of UML to describe the process.
The paper then sketches an application of the CORAS model-based
risk analysis method to an online banking scenario, focusing on
elements of the system as they relate to the trust a banking user
may place on the online baking service. The risk analysis examines
the assets of the bank who owns the online service, for whom users'
trust is manifested in how much they are prepared to invest, which
in turn influences the bank's market share. Thus user trust may be
viewed as an asset of the Bank. This asset can be decomposed into
more specialized assets in this case, using Egger's model of trust).
From this analysis, following the CORAS method:
asset criteria for protection of assets are established
asset risks are identified using formal and informal techniques
the consequences of risks for quantified
risks giving rise to unacceptable asset degradation are treated
This method gives rise to a process of risk analysis targetting user
trust that is similar to risk analysis in the security domain, but
taking account of the phsychological, social, economic and legal
aspects of trust.
""" ;
rdfs:comment
"""
I found this paper well-rewarded a careful reading. It brings together
a wide range of issues (psychology, social, legal, economic) into a
framework that seems to usefully inform the implementation of an
actual system.
""" .
:lncs2995_161_175
dc:creator
[ foaf:name "Paul Ruth"
; foaf:mbox "ruth@cs.purdue.edu"
; foaf:organization "Purdue University"
] ;
dc:creator
[ foaf:name "Dongyan Xu"
; foaf:mbox "dxu@cs.purdue.edu"
; foaf:organization "Purdue University"
] ;
dc:creator
[ foaf:name "Bharat Bhargava"
; foaf:mbox "bb@cs.purdue.edu"
; foaf:organization "Purdue University"
] ;
dc:creator
[ foaf:name "Fred Regnier"
; foaf:mbox "fregnier@purdue.edu"
; foaf:organization "Purdue University"
] ;
dc:title "E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
Discusses the importance of trust and reputation in data sharing communities
(e.g. scientific research) where one party's performance (hence reputatation)
may be subject to the accuracy of another party's data upon which their work
is based.
The paper describes a system for improving the reliance that may be
placed on results that are derived from multiple data sets from
different providers, some of which may themselves be derived from a
combination of sources. The system essentially provides data provenance
information, backed to by digital signatures, combined with a reputation
system that can bne used to form turst views for some data or
data provider.
""" .
:lncs2995_176_190
dc:creator
[ foaf:name "Paolo Giorgini"
; foaf:mbox "giorgini@dit.unitn.it"
; foaf:organization "University of Trento - Italy"
] ;
dc:creator
[ foaf:name "Fabio Massacci"
; foaf:mbox "massacci@dit.unitn.it"
; foaf:organization "University of Trento - Italy"
] ;
dc:creator
[ foaf:name "John Mylopoulos"
; foaf:mbox "jm@cs.toronto.edu"
; foaf:organization "University of Toronto - Canada"
] ;
dc:creator
[ foaf:name "Nicola Zannone"
; foaf:mbox "zannone@dit.unitn.it"
; foaf:organization "University of Trento - Italy"
] ;
dc:title "Requirements Engineering Meets Trust Management; Model, Methodology and Reasoning" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
This paper introduces a formal model and methodology for analyzing trust
as part of the software requirements engineering process. The methodology
is proposed as an enhancement of TROPOS, a software agent development
methodology.
This methodology can be used to support automatic verification of
security requirements and trust relationships against specified
functional dependencies.
""" .
:lncs2995_191_205
dc:creator
[ foaf:name "Ivan Djordjevic"
; foaf:mbox "ivan.djordjevic@elec.qmul.ac.uk"
; foaf:organization "Queen Mary, University of London"
] ;
dc:creator
[ foaf:name "Theo Dimitrakos"
; foaf:mbox "t.dimitrakos@rl.ac.uk"
; foaf:organization "Rutherford Appleton Lab"
] ;
dc:title "Towards Dynamic Security Perimeters for Virtual Collaborative Networks" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
This paper addresses the issues of maintaining security in an evironment
where applications may draw upon the services of several subsystems, which
may be formed and re-formed dynamically as needed to address the needs of
different applications. It describes an architecture for maintaining
security in such an environment.
The architecture includes the following elements:
clients, which form the service components that are to be both
protected and monitored.
local security managers (LSMs), which provide the basis for
distributed security policy enforcement, and
closed collaboration team (CCT) managers, which coordinate the
LSMs and provide them with appropriate policy-derived authorizations.
Communication between these components is supported by public key
certificates and attribute certificates.
An additional level of security is provided by performance monitoring
and assessment, which in turn augments the trust assessment initially
provided by digital certificates.
""" .
:lncs2995_206_220
dc:creator
[ foaf:name "Catholijn M. Jonker"
; foaf:mbox "jonker@cs.vu.nl"
; foaf:organization "Vriej Universiteit Amsterdam"
] ;
dc:creator
[ foaf:name "Joost J.P. Schalken"
; foaf:mbox "joosts@cs.vu.nl"
; foaf:organization "Vriej Universiteit Amsterdam"
] ;
dc:creator
[ foaf:name "Jan Theeuwes"
; foaf:mbox "J.Theeuwes@psy.vu.nl"
; foaf:organization "Vriej Universiteit Amsterdam"
] ;
dc:creator
[ foaf:name "Jan Treur"
; foaf:mbox "treur@cs.vu.nl"
; foaf:organization "Vriej Universiteit Amsterdam"
; foaf:organization "Universiteit Utrecht"
] ;
dc:title "Human Experiments in Trust Dynamics" ;
ps:category "psychology" ;
ps:category "sociology" ;
ps:category "computation" ;
ps:trust "(Several surveyed)" ;
ps:description
"""
This paper starts by surveying some definitions and descriptions of
trust, both with respect to trust being used as a basis for decision
making, and also in terms of the factors that affect how trust is gained
or lost. No definition is singled out.
The paper then goes on to describe an experiment, conducted with real
human subjects, that aims to provide observational evidence related to
the formation and exercise of trust. This experiment serves to verify
some of the elements of trust that have been previosuly proposed
without empirical verification.
""" .
:lncs2995_221_235
dc:creator
[ foaf:name "Paolo Massa"
; foaf:mbox "massa@itc.it"
; foaf:organization "University of Trento"
] ;
dc:creator
[ foaf:name "Bobby Bhattachargee"
; foaf:mbox "bobby@cs.umd.edu"
; foaf:organization "University of Maryland"
] ;
dc:title "Using Trust in Recommender Systems: An Experimental Analysis" ;
ps:category "computation" ;
ps:trust "Trust statement: an explicit assertion that a user trusts another user" ;
ps:description
"""
This paper starts with a brief survey of recommender systems, noting two
main kinds: content-based and those using collaborative filtering (CF).
The former is not considered to be scalable and the paper focuses on the
latter.
A number of problems associated with CF-based recommender systems are
described (sparseness of data for computing user similarity,
lack of usable data for new system users, attacks on the integrity
of recommendations offered, lack of user control over recommendations
given). The existence of these problems is confirmed by analysis of
data from a real large-scale recommender system.
The paper goes on to show that, using the same data, a system that
uses directly expressed or inferred trust values can mitigate all
of the problems noted. In this scenario, a trust value us used as
an alternative to a computed user similarity rating to weight
the ratings of other users when preparing a recommendation.
""" .
:lncs2995_236_250
dc:creator
[ foaf:name "Yao-Hua Tan"
; foaf:mbox "ytan@feweb.vu.nl"
; foaf:organization "Free University, The Netherlands"
] ;
dc:creator
[ foaf:name "Walter Thoen"
# foaf:mbox "ytan@feweb.vu.nl"
; foaf:organization "Free University, The Netherlands"
] ;
dc:creator
[ foaf:name "Yaap Gordijn"
; foaf:mbox "gordijn@cs.vu.nl"
; foaf:organization "Free University, The Netherlands"
] ;
dc:title "Modeling Controls for Dynamic Value Exchanges in Virtual Organizations" ;
ps:category "computation" ;
ps:category "economics" ;
ps:category "legal" ;
ps:trust "The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party" ;
ps:description
"""
This paper starts by discussing the design and life-cycle of virtual
organizations, noting that their operations are governed by contractual
and social norms, the latter including trust. The contractual norms are
easier to vary than the social norms.
It then introduces the E3-value methodology, a conceptual modelling tool
for designing and analyzing the value proposition and value exchanges between
members of a virtual organization. Software tools allow these conceptual
models to be analyzed to ensure the proposed value exchanges are profitable
for all the participants involved. In addition to the primary value exchanges,
there may be others needed in order to complete a transaction ("doing tasks")
or to monitor a transaction ("control tasks"). Control tasks may be needed
to overcome situations of insufficient trust.
The E3-value methodology is enhanced with features that be used to model
control elements, including trust, using elements from coloured Petri nets.
Analysis of the value transfers and available trust can show where
additional control mechanisms may be needed to overcome a lack of trust
necessary to expect a successful conclusion of a transaction.
""" .
:lncs2995_251_265
dc:creator
[ foaf:name "Cai-Nicolas Ziegler"
; foaf:mbox "czeigler@informatik.uni-freiburg.de"
; foaf:organization "Universitat Freiburg"
] ;
dc:creator
[ foaf:name "Georg Lausen"
; foaf:mbox "lausen@informatik.uni-freiburg.de"
; foaf:organization "Universitat Freiburg"
] ;
dc:title "Analyzing Correlation between Trust and User Similarity in Online Communities" ;
ps:category "computation" ;
ps:category "statistics" ;
ps:category "sociology" ;
ps:trust "(None given)" ;
ps:description
"""
This paper starts with an observation that many recommender assume a
correspondence between trust and similarity between users of the system,
which is not substantiated by empricial observation.
It goes on to describe an experiment to compare similarity between users of a
recommender system with expressed trust. Using public data from an online
recommender system (All Consuming), user similarity measures are estimated
from their expressed interest in topics (the data being too sparse for
a calculation based on similarity of actual recommendations).
This is compared statistically with explicit expressions of trust, and
the proposed correspondence is indeed found to be present (though the level
of significance of this correspondence is not clear).
""" ;
rdfs:comment
"""
There seems to be some wooliness in the set up of this experiment.
It could be that what is being expressed as 'trust' is the extent to
which a user expects another's recommendations to be helpful, which
by its nature subsumes a degree of similarity.
In particular, expressed trust in another's recommendations cannot be
presumed to extend to other fields of endeavour, which is hinted at
in the paper (cf. into section 4; section 5 intro corrects this somewhat).
This paper has a good number of trust/reputation/semantic web related
references.
""" .
:lncs2995_266_276
dc:creator
[ foaf:name "Tanko Ishaya"
; foaf:mbox "t.ishaya@hull.ac.uk"
; foaf:organization "University of Hull"
] ;
dc:creator
[ foaf:name "Darren P. Mundy"
; foaf:mbox "d.p.mundy@hull.ac.uk"
; foaf:organization "University of Hull"
] ;
dc:title "Trust Development and Management in Virtual Communities" ;
ps:category "computation" ;
ps:category "sociology" ;
ps:category "psychology" ;
ps:category "legal" ;
ps:category "economics" ;
ps:trust "(None given, but several surveyed)" ;
ps:description
"""
The paper starts with a brief survey of trust and its definitions,
noting that there are many different perceptions that make it
extremely difficult to navigate the various strands of work.
Theories tend to cluster around two main ideas:
rational (based on calculations of cost-benefit analysis), and
social (based on moral duty toward a collective good).
Developing and maintaining trust online is not a straightforward task.
The absence of face-to-face contact makes the sources of trust in virtual
communities fundamentally different. This paper discusses the potential
benfits of and barriers to the introduction of trust in virtual communities,
touching on sociological, psychological, technological, legal and economic
issues.
High-level conceptual methods for building and managing a trusted virtual
community are proposed.
""" .
:lncs2995_277_290
dc:creator
[ foaf:name "Michael Grimsley"
; foaf:mbox "m.f.grimsley@shu.ac.uk"
; foaf:organization "Sheffield Hallam University"
] ;
dc:creator
[ foaf:name "Anthony Meehan"
; foaf:mbox "a.s.meehan@open.ac.uk"
; foaf:organization "The Open University, UK"
] ;
dc:creator
[ foaf:name "Anna Tan"
; foaf:mbox "anna.tan@camden.gov.uk"
; foaf:organization "London Borough of Camden"
] ;
dc:title "Managing Internet-Mediated Community Trust Relations" ;
ps:category "sociology" ;
ps:trust "Trust [makes] possible the achievement of community objectives that would not be attainable in its absence" ;
ps:trust "Horizontal Trust: arises from relations between [community members]" ;
ps:trust "Vertical Trust: arises from relations [of community members] with local councils and providers of public services" ;
ps:description
"""
This paper looks at trust as a form of community social capital.
It describes a framework for building and managing trust in a community,
and describes its application to online services in Camden. The framework
features a community trust cycle, a trust compact and an experience
management matrix, which collectively support managers in addressing the
relational dynamics of community trust relations.
""" .
:lncs2995_291_303
dc:creator
[ foaf:name "Robert Demolombe"
; foaf:mbox "Robert.Demolombe@cert.fr"
; foaf:organization "ONERA Tolouse"
] ;
dc:title "Reasoning About Trust: A Formal Logical Framework" ;
ps:category "logic" ;
ps:trust "A mental attitude of an agent with respect to some property held by another agent" ;
ps:description
"""
Introduces three problems of dealing with trust:
defining the facts that support trust,
finding appropriate rules to derive the consequences
of a set of assumptions about trust, and
using information about trust to make decisions.
The paper goes on to focus on the second problem.
The paper proposes a modal propositional logic language based on the
epistemic properties sincerity, credibility, vigilance, validity and completeness,
which are themselves defined in terms of epistemic (knowledge) modal operators
belief and informing.
Various forms of trust are defined in terms of implications using these
properties.
A number of axioms, and some logical consequences of those axioms are given.
The epistemic pattern is extended to deal with deontic (obligation) and dynamic
(ability) properties: obedience, laziness, active (effectiveness?) and honesty.
Using the logical framework thus constructed, some intuitive properties of
trust can be formally derived ("rediscovered") from the given definitions and
axioms.
""" .
:lncs2995_304_318
dc:creator
[ foaf:name "Christiano Castelfranchi"
; foaf:mbox "c.castelfranchi@istc.cnr.it"
; foaf:organization "Institute for Cognitive Sciences and Technoloigies - CNR"
] ;
dc:title "Trust Mediation in Knowledge Management and Sharing" ;
ps:category "sociology" ;
ps:trust "Three components: (1) a mental attitude towards another agent, (2) a decision to rely on the other, and (3) a behaviour, or act of trusting" ;
ps:description
"""
This paper examines the role of trust in knowledge-sharing processes,
starting from previous work in organizational knowledge studies.
It uses a cognitive model of the goals and beliefs of an agent involved
in a decision to pass or accept knowledge, and a network model of trust
within groups of agents. This leads to a theoretical model of cognitive
attitudes, including trust, that may lead to effective knowledge sharing.
[[[This is my best attempt;
I'm not sure that I properly understood what this paper is saying.]]]
""" .
:lncs2995_319_332
dc:creator
[ foaf:name "Adrian Baldwin"
; foaf:mbox "Adrian.Baldwin@hp.com"
; foaf:organization "Hewlett Packard Labs, Bristol"
] ;
dc:title "Enhanced Accountability for Electronic Processes" ;
ps:category "computation" ;
ps:trust "(None given)" ;
ps:description
"""
This paper discusses the role of accountability in building trust in
electronic transactions, and empasizes the need for transparency
(i.e. visibility of all appropriate information) to establish appropriate
levels of trust and accountability.
It proposes the use of an trusted evidence store that allows interested
parties to interactively monitor all significant events relating to a
transaction.
An outline is given of how such a store might be implemented, using
a combination of cryptographic techniques and secure hardware to ensure
integrity, completeness and confidentiality of the audit data.
""" .
#########################
#:lncs2995_x_x
# dc:creator
# [ foaf:name "..."
# ; foaf:mbox "...@..."
# ; foaf:organization "..."
# ] ;
# dc:title "..." ;
# ps:category "computation" ;
# ps:trust "..." ;
# ps:description
#"""
#...
#""" .
# Notes
# - recommendations: seems to be consensus to communicate only direct observations
# --------+---------+---------+---------+---------+---------+---------+---------+
# $Log: iTrust-survey.n3,v $
# Revision 1.1 2004/10/19 14:42:05 graham
# iTrust survey docs to Web site CVS
#
# Revision 1.10 2004/10/04 16:28:32 graham
# Minor reformatting and fixes.
#
# Revision 1.9 2004/10/04 15:50:00 graham
# Various fixes to survey data. Now processable Notation3
#
# Revision 1.8 2004/09/28 19:07:07 graham
# Sync.
#
# Revision 1.7 2004/09/20 18:01:56 graham
# Finished surveying main 2004 conference papers.
# (Short papers to follow, when time permits.)
#
# Revision 1.6 2004/09/16 21:30:04 graham
# More 2004 conference papers surveyed.
#
# Revision 1.5 2004/09/15 16:33:49 graham
# More 2004 conference papers surveyed.
#
# Revision 1.4 2004/09/14 18:12:04 graham
# Started on 2004 conference papers
#
# Revision 1.3 2004/09/14 16:32:40 graham
# Fix error in filename
#
# Revision 1.4 2004/09/14 16:23:29 graham
# Completed initial survey of 2003 conference papers.
#
# Revision 1.3 2004/09/13 20:08:10 graham
# More surveys of 2003 conference papers added.
#
# Revision 1.2 2004/09/13 11:40:53 graham
# Added several article summaries from 2003 conference (up to SULTAN).
#